{"vulnerability": "CVE-2024-1278", "sightings": [{"uuid": "e54e13b0-9a3c-4036-bc44-d91165511b76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12785", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldo62kkzbz2s", "content": "", "creation_timestamp": "2024-12-19T15:15:45.021218Z"}, {"uuid": "742adbc1-845c-4d0d-bf49-f19b96d0b704", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12789", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldoeqvyicw27", "content": "", "creation_timestamp": "2024-12-19T17:15:37.581359Z"}, {"uuid": "822c5bd8-c089-479f-92fa-dbe896f52087", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12788", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldoeqtu5bb2g", "content": "", "creation_timestamp": "2024-12-19T17:15:35.450268Z"}, {"uuid": "8667728a-09dc-4fda-98e2-39b1179e0ccf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12784", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113679881688286497", "content": "", "creation_timestamp": "2024-12-19T14:08:55.957821Z"}, {"uuid": "d53e1b0e-6bfb-45d1-b7f5-1db3af6ab4bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12782", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113679517721524504", "content": "", "creation_timestamp": "2024-12-19T12:36:22.208771Z"}, {"uuid": "afcbaa49-37a6-4880-b277-e2f16b863593", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12784", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldo2owrgul2v", "content": "", "creation_timestamp": "2024-12-19T14:15:33.858940Z"}, {"uuid": "6552e5fa-7e8a-47e5-9a6d-f07f4789b21f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12783", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113679517755737386", "content": "", "creation_timestamp": "2024-12-19T12:36:22.654053Z"}, {"uuid": "47090411-a33e-42a0-a6df-d77164a87c87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12787", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldobfgszxk2x", "content": "", "creation_timestamp": "2024-12-19T16:15:31.368845Z"}, {"uuid": "586ec1d0-062d-495c-9a6f-acd5bd1d793a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12785", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113680001427828016", "content": "", "creation_timestamp": "2024-12-19T14:39:22.997143Z"}, {"uuid": "c50f9c82-326d-4401-901e-38ba9f6d5052", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12782", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldnxdpqclm2m", "content": "", "creation_timestamp": "2024-12-19T13:15:36.235710Z"}, {"uuid": "d240c013-9a8c-41b7-91e4-815df9e50034", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12783", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldnxdse3dm2b", "content": "", "creation_timestamp": "2024-12-19T13:15:38.890868Z"}, {"uuid": "bcc5326c-0e2d-4baa-b95d-28f6b9a00483", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12788", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113680447406326426", "content": "", "creation_timestamp": "2024-12-19T16:32:48.004294Z"}, {"uuid": "d4c29761-43bc-4a8c-8a95-1aed03b72055", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12789", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113680447422241361", "content": "", "creation_timestamp": "2024-12-19T16:32:48.484455Z"}, {"uuid": "f873167d-55b2-4b1f-949a-c3e0e9d355a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12786", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113680107726606149", "content": "", "creation_timestamp": "2024-12-19T15:06:24.911395Z"}, {"uuid": "07edc493-f4a8-4b7d-a27d-3bcac352c328", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12786", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldo62mrkik2r", "content": "", "creation_timestamp": "2024-12-19T15:15:48.082591Z"}, {"uuid": "f595a5e1-5cef-4c3a-a9ee-722065244e21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12781", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113785784777858979", "content": "", "creation_timestamp": "2025-01-07T07:01:29.451449Z"}, {"uuid": "e852044c-46a2-4ef7-be87-21bb49ba48df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12781", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf544hjzyc2e", "content": "", "creation_timestamp": "2025-01-07T07:16:08.841228Z"}, {"uuid": "924da94a-9087-44a9-a6f3-decc50993887", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12781", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf544hjzyc2e", "content": "", "creation_timestamp": "2025-01-07T07:16:08.822794Z"}, {"uuid": "ced807b4-b31e-4630-83cc-ef7696d5edf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12781", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf5aycl7st2k", "content": "", "creation_timestamp": "2025-01-07T08:43:18.349259Z"}, {"uuid": "282a3985-b073-413e-8ac6-72cbfd5d47b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12789", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-15T13:28:31.000000Z"}, {"uuid": "3c5276e8-b121-45c9-ab8d-93e99ef3386e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12787", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-15T13:28:31.000000Z"}, {"uuid": "60911c88-b1f2-4f01-a044-4a2253068e00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12785", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-15T13:28:31.000000Z"}, {"uuid": "e1a2c1d8-31e7-438d-9afd-9bb1bfc61cbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12784", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-15T13:28:32.000000Z"}, {"uuid": "69294d65-c221-498a-8095-c2307f7f65a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12783", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-15T13:28:32.000000Z"}, {"uuid": "ee2c4c9e-518a-4951-8671-0b0f262552ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12785", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-16T03:45:02.000000Z"}, {"uuid": "340dc134-9526-48ee-8b43-2bad3766c4fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12787", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-16T03:45:02.000000Z"}, {"uuid": "adcfda41-e6d8-44b4-9687-c860104994bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12789", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-16T03:45:01.000000Z"}, {"uuid": "9ec3098b-90c9-40a7-8780-c911d60c36d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12784", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-16T03:45:02.000000Z"}, {"uuid": "6cb9eb22-19a6-43d3-b2e2-3d2e250aeeeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12783", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-16T03:45:02.000000Z"}, {"uuid": "8931da18-d65b-4192-ab93-3418baeb0a65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12781", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/368", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12781\n\ud83d\udd39 Description: The Aurum - WordPress &amp; WooCommerce Shopping Theme theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'lab_1cl_demo_install_package_content' function in all versions up to, and including, 4.0.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite content with imported demo content.\n\ud83d\udccf Published: 2025-01-07T06:40:59.272Z\n\ud83d\udccf Modified: 2025-01-07T06:40:59.272Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/cd132aa5-d30a-41de-aa8d-aefae6c95c47?source=cve\n2. https://documentation.laborator.co/kb/aurum/aurum-release-notes/", "creation_timestamp": "2025-01-07T07:37:22.000000Z"}, {"uuid": "c3dd7903-a7e1-48e2-9ac3-7d377362e238", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12782", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5535", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12782\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability has been found in Fujifilm Apeos C3070, Apeos C5570 and Apeos C6580 up to 24.8.28 and classified as critical. This vulnerability affects unknown code of the file /home/index.html#hashHome of the component Web Interface. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor explains that \"during technical verification it is not possible to reproduce any active actions like reboots which were mentioned in the original researcher disclosure.\"\n\ud83d\udccf Published: 2024-12-19T12:31:07.155Z\n\ud83d\udccf Modified: 2025-02-26T15:54:01.223Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.288958\n2. https://vuldb.com/?ctiid.288958\n3. https://vuldb.com/?submit.458897\n4. https://www.fujifilm.com/fbglobal/eng/company/news/notice/2024/1226_announce.html", "creation_timestamp": "2025-02-26T16:24:33.000000Z"}, {"uuid": "958b84d2-3d43-44a7-af02-7162a1da26bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12788", "type": "seen", "source": "https://t.me/cvedetector/13346", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12788 - Codezips Technical Discussion Forum SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12788 \nPublished : Dec. 19, 2024, 5:15 p.m. | 36\u00a0minutes ago \nDescription : A vulnerability was found in Codezips Technical Discussion Forum 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file signinpost.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T19:00:01.000000Z"}, {"uuid": "45148722-0932-4ffd-a08a-c286d316ce17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12782", "type": "seen", "source": "Telegram/jI-ziKY_wX-x8VxGbDq94Mgm1Oi4M16ZlunioiOwreGl0lXu", "content": "", "creation_timestamp": "2025-03-02T11:44:22.000000Z"}, {"uuid": "bcc5bcfd-3209-4879-a7da-f699b9017d68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12781", "type": "seen", "source": "https://t.me/cvedetector/14491", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12781 - Aurum - WordPress &amp; WooCommerce Shopping Theme Remote Data Tampering\", \n  \"Content\": \"CVE ID : CVE-2024-12781 \nPublished : Jan. 7, 2025, 7:15 a.m. | 30\u00a0minutes ago \nDescription : The Aurum - WordPress &amp; WooCommerce Shopping Theme theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'lab_1cl_demo_install_package_content' function in all versions up to, and including, 4.0.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite content with imported demo content. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T08:51:06.000000Z"}, {"uuid": "aa412854-f28f-4a83-a868-964892b6e423", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12789", "type": "seen", "source": "https://t.me/cvedetector/13347", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12789 - PbootCMS Remote Code Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12789 \nPublished : Dec. 19, 2024, 5:15 p.m. | 36\u00a0minutes ago \nDescription : A vulnerability was found in PbootCMS up to 3.2.3. It has been classified as critical. This affects an unknown part of the file apps/home/controller/IndexController.php. The manipulation of the argument tag leads to code injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.2.4 is able to address this issue. It is recommended to upgrade the affected component. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T19:00:01.000000Z"}, {"uuid": "4fdfad2b-f9a1-4032-93e4-e93d3592bdb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12784", "type": "seen", "source": "https://t.me/cvedetector/13333", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12784 - iSourcecode Vehicle Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12784 \nPublished : Dec. 19, 2024, 2:15 p.m. | 22\u00a0minutes ago \nDescription : A vulnerability was found in itsourcecode Vehicle Management System 1.0. It has been classified as critical. Affected is an unknown function of the file editbill.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T15:39:23.000000Z"}, {"uuid": "ea9da68a-384d-4321-92e9-c5596b4aacb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12787", "type": "seen", "source": "https://t.me/cvedetector/13343", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12787 - 1000 Projects Attendance Tracking Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12787 \nPublished : Dec. 19, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : A vulnerability has been found in 1000 Projects Attendance Tracking Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /student/check_student_login.php. The manipulation of the argument student_emailid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T18:09:52.000000Z"}, {"uuid": "44437caf-d25c-4828-a9de-252d0b2157ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12782", "type": "seen", "source": "https://t.me/cvedetector/13328", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12782 - Fujifilm Apeos Web Interface Improper Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12782 \nPublished : Dec. 19, 2024, 1:15 p.m. | 32\u00a0minutes ago \nDescription : A vulnerability has been found in Fujifilm Apeos C3070, Apeos C5570 and Apeos C6580 up to 24.8.28 and classified as critical. This vulnerability affects unknown code of the file /home/index.html#hashHome of the component Web Interface. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T14:49:10.000000Z"}, {"uuid": "29360a1d-d96e-44ce-937e-7d4d21407d63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12783", "type": "seen", "source": "https://t.me/cvedetector/13326", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12783 - Itsourcecode Vehicle Management System Cross Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12783 \nPublished : Dec. 19, 2024, 1:15 p.m. | 32\u00a0minutes ago \nDescription : A vulnerability was found in itsourcecode Vehicle Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file /billaction.php. The manipulation of the argument extra-cost leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T14:49:09.000000Z"}, {"uuid": "af2e2581-f848-4852-898f-942ea45b623d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12785", "type": "seen", "source": "https://t.me/cvedetector/13338", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12785 - Cisco: Vehicle Management System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-12785 \nPublished : Dec. 19, 2024, 3:15 p.m. | 43\u00a0minutes ago \nDescription : A vulnerability was found in itsourcecode Vehicle Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file sendmail.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T17:19:40.000000Z"}, {"uuid": "914a9d8c-1e3d-499c-b9ee-7b07a17558d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12786", "type": "seen", "source": "https://t.me/cvedetector/13337", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12786 - Adobe Downloader XPC Service Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12786 \nPublished : Dec. 19, 2024, 3:15 p.m. | 43\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in X1a0He Adobe Downloader up to 1.3.1 on macOS. Affected is the function shouldAcceptNewConnection of the file com.x1a0he.macOS.Adobe-Downloader.helper of the component XPC Service. The manipulation leads to improper privilege management. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. This product is not affiliated with the company Adobe. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T17:19:39.000000Z"}, {"uuid": "95927a7e-ac29-4718-af3d-67f362e3585d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12784", "type": "seen", "source": "Telegram/ACdvdw15_6xp7r3FPMrLgrxpzuBS_jC8LpST0Anu02-nLpl2", "content": "", "creation_timestamp": "2025-02-14T10:01:45.000000Z"}]}